Search Results

Results (44)

Search Parameters:

Keyword: Protection
Order results
Results per page
Open AccessArticle
8 Pages, 1,176 KB Download PDF

A Toolkit for the Automatic Analysis of Human Behavior in HCI Applications in the Wild

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 185–192, 2020; DOI: 10.25046/aj050622
Abstract:

Nowadays, smartphones and laptops equipped with cameras have become an integral part of our daily lives. The pervasive use of cameras enables the collection of an enormous amount of data, which can be easily extracted through video images processing. This opens up the possibility of using technologies that until now had been restricted to laboratories,…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
8 Pages, 1,019 KB Download PDF

Essential Features/Issues of a Multi-Phase Switching Synchronous Buck Regulator

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 1056–1063, 2020; DOI: 10.25046/aj0505130
Abstract:

This paper addresses essential features/issues and proposes solutions that would improve the overall performance of a multi-phase buck converter. Low efficiency at light load is addressed with phase shedding, load fast transient and regulated output voltage spiking/dipping is addressed with novel helper technique at the point of load (output node). An Integrated current sensing is…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Electrical Engineering (ELE))
Open AccessArticle
5 Pages, 939 KB Download PDF

Case Study to Determine the Causes of Fire in Agriculture

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 11–15, 2020; DOI: 10.25046/aj050502
Abstract:

The aim of this paper is to identify a critical link in the man – machine – environment system in the case of an adverse event, such as a hay baling fire, based on a comprehensive risk assessment method. The rate of spread of fires in agriculture depends on meteorological conditions, with large areas affected…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Agricultural Engineering (AEN))
Open AccessArticle
8 Pages, 805 KB Download PDF

Design of Aerial Panoramic Photography: Contrast between Industrialized and Natural Zones

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 849–856, 2020; DOI: 10.25046/aj050499
Abstract:

This study utilized aerial panoramic photography and 3D virtual reality to demonstrate the environmental changing issues. Environmental problems have occurred in the surroundings for a long time, but the public has gradually become numb. The wide view through aerial photography helps to show the difference. The proposed self-assembled drone equipped with an antishock bracket containing…

Read More
(This article belongs to Section Environmental Engineering (EEV))
Open AccessArticle
7 Pages, 548 KB Download PDF

Machine Learning for Network Intrusion Detection Based on SVM Binary Classification Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 638–644, 2020; DOI: 10.25046/aj050476
Abstract:

Recently, the number of connected machines around the worldwide has become very large, generating a huge amount of data either to be stored or to be communicated. Data protection is a concern for all institutions, it is difficult to manage the masses of data that are susceptible to multiple threats. In this work, we present…

Read More
(This article belongs to the iraset-20 (Special Issue on Innovative Research in Applied Science, Engineering and Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 1,022 KB Download PDF

A Support Vector Machine Based Technique for Fault Detection in A Power Distribution Integrated System with Renewable Energy Distributed Generation

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 577–588, 2020; DOI: 10.25046/aj050468
Abstract:

The integration of renewable energy distributed generation (REDG) into the energized distribution power grid has become more popular in recent years. This has been escalated by the general global energy shortages. The REDG has proven to be effective for energy sustainability and reliability. However, there are technical challenges which arise from integrating REDG into the…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
8 Pages, 625 KB Download PDF

Based on Reconfiguring the Supercomputers Runtime Environment New Security Methods

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 291–298, 2020; DOI: 10.25046/aj050338
Abstract:

This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 212 KB Download PDF

Digital Sovereignty Between “Accountability” and the Value of Personal Data

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 270–274, 2020; DOI: 10.25046/aj050335
Abstract:

In the last year, especially in Europe, the expression “digital sovereignty” has been used very frequently to describe, above all, the primacy of a State. Indeed, the “digital sovereignty” is a complex concept, which entails cross-reference with several sectors and contexts. We believe that the concept of “digital sovereignty” can be two sides of a…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 932 KB Download PDF

Comparison of the RC-Triggered MOSFET-Based ESD Clamp Circuits for an Ultra-low Power Sensor System

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 718–723, 2020; DOI: 10.25046/aj050289
Abstract:

This paper uses the RC-triggered MOSFET-based electrostatic discharge (ESD) power clamp to conduct ESD from ESD events and not affect the ultra-low power sensor system. Then using the stacked device include stacked MOSFET or stacked BJT to reduce the leakage current which increases with temperature. Moreover, we compare gate-driven method and two-level–driven with both gate-driven…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
6 Pages, 1,570 KB Download PDF

A Framework for Plans Permeable Breakwater Eco-Friendly Building Identification and Characteristics Materials Construction Study Case at Demak Village

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 235–240, 2020; DOI: 10.25046/aj050230
Abstract:

Demak is located on the north coast of Java, precisely in Central Java Province, Indonesia which has many problems related to erosion and shoreline degradation. This study attempts to analyze, identify, and select the materials to build eco-friendly permeable breakwater in Demak. The research was conducted during 2014, consist of several activities, i.e. identified the…

Read More
(This article belongs to Section Marine Engineering (EMR))
Open AccessArticle
10 Pages, 831 KB Download PDF

Analysis of Cyberattacks in Public Organizations in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 116–125, 2020; DOI: 10.25046/aj050215
Abstract:

It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 653 KB Download PDF

New Solution Implementation to Protect Encryption Keys Inside the Database Management System

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 87–94, 2020; DOI: 10.25046/aj050211
Abstract:

Due to the attacks’ growth on sensitive databases by deploying advanced tools, beyond access control and authentication mechanisms, the database encryption remains a useful and effective way to ensure robust security of data stored within it. Any database encryption solution is based on a specific encryption model that determines how data is encrypted inside it.…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
7 Pages, 2,062 KB Download PDF

Enabling 3D Heterogeneous Structures Towards Smart Chips: A Review

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 267–273, 2020; DOI: 10.25046/aj050134
Abstract:

This review paper discusses recent research outcomes of fabricating three-dimensional (3D) heterogeneous structures in complementary metal-oxide-semiconductor (CMOS) integrated circuit (IC) technologies to enable smart future chips. The CMOS-based 3D heterogeneous structures demonstrated are vertical magnetic-cored inductors for radio-frequency (RF) ICs, through-back-end-of-line (BEOL) metal wall structures for global flying noise isolation, above-IC nano crossbar array electrostatic…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Electronic Engineering (EEE))
Open AccessArticle
9 Pages, 1,134 KB Download PDF

Effectiveness and Comparison of Digital Substations Over Conventional Substations

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 431–439, 2019; DOI: 10.25046/aj040452
Abstract:

The entire electrical system is changing at an abrupt speed since its beginning. With the rapid advance of renewable energies (which are constantly subject to fluctuations), the electricity generation is distributed to countless locations. The traditional model of the unidirectional flow of electricity is leaning towards multidirectional flows. This situation needs significant changes in the…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Electrical Engineering (ELE))
Open AccessArticle
13 Pages, 811 KB Download PDF

Computer Security as an Engineering Practice: A System Engineering Discussion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 357–369, 2019; DOI: 10.25046/aj040245
Abstract:

We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 636 KB Download PDF

Adaptation of Electronic Book Publishing Technology by The Publishers in Southeast Nigeria

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 425–431, 2018; DOI: 10.25046/aj030650
Abstract:

This paper investigates the electronic book production and distribution practices adopted by the Publishers in Southeast Nigeria because of the global growing interest in writing new book titles in digital form as well as converting paper titles to digital content. To investigate this study, the researcher formulated three research questions to guide the study. A…

Read More
(This article belongs to Section Multidisciplinary Sciences (MUS))
Open AccessArticle
9 Pages, 356 KB Download PDF

Evolving AL-FEC Application on 5G NGMN-Edge Computing Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 152–160, 2018; DOI: 10.25046/aj030519
Abstract:

Fifth generation of mobile networks (5G) comes to cope with the context of the new mobile telecommunications era. Edge computing is a new collaborative technology under standardization utilizing end-user devices or near-end-user edge devices to operate processing, communication, or control operations. The achievement of efficient error control is a very critical aspect in the successful…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Telecommunications (TEL))
Open AccessArticle
15 Pages, 1,137 KB Download PDF

Privacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 134–148, 2017; DOI: 10.25046/aj020116
Abstract:

Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))
Open AccessArticle
6 Pages, 734 KB Download PDF

Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 21–26, 2016; DOI: 10.25046/aj010505
Abstract:

Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Cybernetics in Computer Science (CCY))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026