Search Results

Results (56)

Search Parameters:

Keyword: ISMS
Order results
Results per page
Open AccessArticle
12 Pages, 1,515 KB Download PDF

Defeating Anti-Debugging Techniques for Malware Analysis Using a Debugger

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1178–1189, 2020; DOI: 10.25046/aj0506142
Abstract:

Cyberattacks such as spear phishing and malspam pretending to be companies, institutes, and government officials are increasing and evolving. Malware has a variety of purposes, such as collecting personal information and illegal access to the system. New types of malware are increasing every day, and many malware programs spread all over the Internet, causing severe…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 936 KB Download PDF

Dissection of Quantitative Trait Loci (QTL), Annotation of Single Nucleotide Polymorphism (SNP), and Identification of Candidate Genes for Grain Yield in Triticum turgidum L. var durum

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 1020–1027, 2020; DOI: 10.25046/aj0505125
Abstract:

Durum wheat (Triticum turgidum L. var durum) is among the most important crops in the world. High and stable grain yield in diverse environments is the major objective in durum breeding programs. This trait is linked to the quantitative trait loci (QTL). For the detection of QTL linked to the grain yield, it is necessary…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Biotechnology & Applied Microbiology (BAM))
Open AccessArticle
7 Pages, 760 KB Download PDF

A Typological Study of Portuguese Mortality from Non-communicable Diseases

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 613–619, 2020; DOI: 10.25046/aj050575
Abstract:

The most common non-communicable diseases, such as cardiovascular diseases and cancer, are a problem in global and national growth. The World Health Organization considers it a priority to study the specific causes of these diseases for trend monitoring. The aim of this paper is to identify a hierarchy of clusters of Portuguese mortality by non-communicable…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Immunology (IMN))
Open AccessArticle
5 Pages, 595 KB Download PDF

Ontologic Design of Software Engineering Knowledge Area Knowledge Components

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 30–34, 2020; DOI: 10.25046/aj050404
Abstract:

The article sets forth the solution of the educational resources semantic context knowledge components development task, based on the learning technology project-oriented concepts, graduate’s competency model and ontological; engineering. The being considered ontology model and knowledge display formalisms allow, firstly, relevantly image the educational resources semantic context in the support concepts ontology format, and their…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
11 Pages, 2,283 KB Download PDF

A Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 518–528, 2020; DOI: 10.25046/aj050364
Abstract:

It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 1,131 KB Download PDF

A Survey on Image Forgery Detection Using Different Forensic Approaches

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 361–370, 2020; DOI: 10.25046/aj050347
Abstract:

Recently, digital image forgery detection is an emergent and important area of image processing. Digital image plays a vital role in providing evidence for any unusual incident. However, the image forgery my hide evidence and prevents the detection of such criminal cases due to advancement in image processing and availability of sophisticated software tamper of…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
9 Pages, 1,010 KB Download PDF

Angular Orientation of Steering Wheel for Differential Drive

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 275–283, 2020; DOI: 10.25046/aj050336
Abstract:

Several drive mechanisms for different robots are at hand in current days. Bicycle steering, Ackerman steering, differential drive are some principal drive mechanisms that are being deployed in robots these days. The differential drive needs the wheel rotations to be updated very frequently. But it is most commonly deployed on the robots with two wheels…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Robotics (ROB))
Open AccessArticle
8 Pages, 653 KB Download PDF

New Solution Implementation to Protect Encryption Keys Inside the Database Management System

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 87–94, 2020; DOI: 10.25046/aj050211
Abstract:

Due to the attacks’ growth on sensitive databases by deploying advanced tools, beyond access control and authentication mechanisms, the database encryption remains a useful and effective way to ensure robust security of data stored within it. Any database encryption solution is based on a specific encryption model that determines how data is encrypted inside it.…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
9 Pages, 5,430 KB Download PDF

Distributed Linear Summing in Wireless Sensor Networks with Implemented Stopping Criteria

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 19–27, 2020; DOI: 10.25046/aj050203
Abstract:

Many real-life applications based on the wireless sensor networks are equipped with data aggregation mechanisms for suppressing or even overcoming negative environmental effects and data redundancy. In this paper, we present an extended analysis of the linear average consensus algorithm for distributed summing with bounded execution over wireless sensor networks. We compare a centralized and…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Network Engineering (ENW))
Open AccessArticle
11 Pages, 3,149 KB Download PDF

Chatting with Plants (Orchids) in Automated Smart Farming using IoT, Fuzzy Logic and Chatbot

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 163–173, 2019; DOI: 10.25046/aj040522
Abstract:

Plants are living organisms that can hear and recognize the environment around them but cannot communicate to inform their needs. Thus, in the past, humans thought that it was impossible to communicate with plants. However, in this modern era, humans can be able to communicate with these plants. In this paper, we propose a model…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Agricultural Engineering (AEN))
Open AccessArticle
9 Pages, 715 KB Download PDF

The Role of Information Technology Human Capability in the Implementation of Information Technology Governance (ITG): A Systematic Literature Review on Malaysian Organizations

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 314–322, 2019; DOI: 10.25046/aj040440
Abstract:

This study reviewed articles on information technology governance (ITG) in the Malaysian context and categorized the issues found in ITG implementation according to organizational-related and human-related issues. It further analysed the impact and role of information technology (IT) human capability in ITG implementation in developing countries like Malaysia, which is still in the infancy stage…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Engineering Management (EMM))
Open AccessArticle
8 Pages, 696 KB Download PDF

Prototype of a Security Architecture for a System of Electronic Voting for the Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 292–299, 2019; DOI: 10.25046/aj040437
Abstract:

To be able to perform a better voting system, it is important to go to ICT and its various platforms designed for electoral purposes, which are being used in several countries in Latin America. In Ecuador are being used digital mechanisms during the process, but with certain errors and he is being considered to implement…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 811 KB Download PDF

Computer Security as an Engineering Practice: A System Engineering Discussion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 357–369, 2019; DOI: 10.25046/aj040245
Abstract:

We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 2,143 KB Download PDF

Hybrid Technique for Enhancing Underwater Image in blurry conditions

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 340–350, 2019; DOI: 10.25046/aj040243
Abstract:

Enhancing underwater visualization using hybrid technique is generally employed into oceanic production. Through growing oceanic learning, undersea processing has drawn extra importance owing towards necessary task of picture towards attaining data. Although, suitable to reality of dust-like constituent and beam reduction, undersea descriptions continually experience small contrast and color alteration. In this paper, we estimate…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 689 KB Download PDF

Virtualization in Cloud Environment: Bandwidth Management

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 221–227, 2019; DOI: 10.25046/aj040229
Abstract:

Cloud computing recently emerged as an interesting model that enables computing and other related internet activities to take place anywhere, anytime. Cloud service providers centralize all servers, networks, and applications to allow their users’ access at any time and from any location. Cloud computing uses already existing resources like server, CPU and storage memory but…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
12 Pages, 700 KB Download PDF

Application Layer Security Authentication Protocols for the Internet of Things: A Survey

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 317–328, 2019; DOI: 10.25046/aj040131
Abstract:

Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
10 Pages, 738 KB Download PDF

Insight into the IEEE 802.1 Qcr Asynchronous Traffic Shaping in Time Sensitive Network

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 292–301, 2019; DOI: 10.25046/aj040128
Abstract:

TSN is an attractive solution for latency-critical frame transmission built upon IEEE 802 architecture. Traffic scheduling and shaping in TSN aim to achieve bounded low latency and zero congestion loss. However, the most widespread solution (i.e. Time-Aware Shaper) requires a networkwide precision clock reference and only targets on cyclical traffic flows. This paper focuses on…

Read More
(This article belongs to Section Telecommunications (TEL))
Open AccessArticle
13 Pages, 1,773 KB Download PDF

Simulation Strategy to Enhance Oxygen Uptake and Reaction Forces at Leg Joints and Vertebral Bodies During Ergometer Exercise Under Altered Gravity

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 8–20, 2021; DOI: 10.25046/aj030402
Abstract:

Moderate exercise has been implemented in spaceflight programs to prevent muscle and joint damage under extreme circumstances such as microgravity. Although the physical effects of exercise have been investigated experimentally, advanced modeling and simulation techniques are powerful tools that could provide insight into the physical limitations, optimal conditions, and mechanisms that might lead to muscle…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Biomedical Engineering (EBI))
Open AccessArticle
10 Pages, 344 KB Download PDF

A Joint Safety and Security Analysis of message protection for CAN bus protocol

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 384–393, 2018; DOI: 10.25046/aj030147
Abstract:

One of the prominent challenges of the automotive-transportation system is represented by the integration of security and safety properties within protocols, applications and connectivity mechanisms. A joint safety/security design can sometimes expose to trade-offs, since their requirements may not match perfectly or even be incompatible. This paper analyses an example of security and safety design,…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 935 KB Download PDF

Analysis of Outdoor and Indoor Propagation at 15 GHz and Millimeter Wave Frequencies in Microcellular Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 160–167, 2018; DOI: 10.25046/aj030120
Abstract:

The main target of this article is to perform the multidimensional analysis of multipath propagation in an indoor and outdoor environment at higher frequencies i.e. 15 GHz, 28 GHz and 60 GHz, using “sAGA” a 3D ray tracing tool. A real world outdoor Line of Sight (LOS) microcellular environment from the Yokusuka city of Japan…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Telecommunications (TEL))
Open AccessArticle
12 Pages, 1,921 KB Download PDF

Cognitive Cybernetics vs. Captology

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 107–118, 2017; DOI: 10.25046/aj020614
Abstract:

In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 870 KB Download PDF

Discovering Interesting Biological Patterns in the Context of Human Protein-Protein Interaction Network and Gene Disease Profile Data

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 87–93, 2017; DOI: 10.25046/aj020611
Abstract:

The current advances in proteomic and transcriptomic technologies produced huge amounts of high-throughput data that spans multiple biological processes and characteristics in different organisms. One of the important directions in today’s bioinformatics research is to discover patterns of genes that have interesting properties. These groups of genes can be referred to as functional modules. Detecting…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Biochemistry & Molecular Biology (BMB))
Open AccessArticle
10 Pages, 5,355 KB Download PDF

Soft Handoff Evaluation and Efficient Access Network Selection in Next Generation Cellular Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1616–1625, 2017; DOI: 10.25046/aj0203201
Abstract:

The increased motivation (by service providers) to offer user-centric and seamless communication services – that satisfies users’ quality of experience (QoE), has manifested a myriad of challenges in the field of wireless communication; and given the increased traffic capacity and sudden explosion of cellular devices, communication systems are constantly threatened by performance related issues –…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 706 KB Download PDF

The effect of employing knowledge workers from technologically advanced countries: The knowledge spillover caused by the mobility of knowledge workers in electronic industries in Asia

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1342–1349, 2017; DOI: 10.25046/aj0203169
Abstract:

This paper is an extension of work originally presented in 2017 6th International Conference on Industrial Technology and Management (ICITM) [53]. This research focuses on the mobilization of human resources in the Asian electrical industry and analyzes the impact of engineers’ international mobility on the innovation of enterprises in the host countries. I examine the…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 445 KB Download PDF

Towards Deployment Strategies for Deception Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1272–1279, 2017; DOI: 10.25046/aj0203161
Abstract:

Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026