Search Results

Results (41)

Search Parameters:

Keyword: Risks
Order results
Results per page
Open AccessArticle
10 Pages, 1,105 KB Download PDF

Approach to Combine an Ontology-Based on Payment System with Neural Network for Transaction Fraud Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 551–560, 2020; DOI: 10.25046/aj050269
Abstract:

Fraud, as regards means of payment, means the behavior of any legal or natural one that makes an abnormal or irregular use of a way of payment, elements of it or information contained therein, to improperly obtain an honest, service or enrichment, and or causing financial damage to the one that has distributed the means…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
13 Pages, 1,035 KB Download PDF

Storing and Transporting Hazardous Material, Logistics Strategies for Moroccan Companies

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 21–33, 2020; DOI: 10.25046/aj050104
Abstract:

Companies manufacturing, using or transporting hazardous materials (HM) face risks at every link in their supply chain. Industrial activities related to this type of material expose not only the workers, but also the population and environment to serious risks. Logistic management and risk management are often considered independent. However, logistics choices related to hazardous materials…

Read More
(This article belongs to Section Industrial Engineering (EID))
Open AccessArticle
6 Pages, 1,341 KB Download PDF

Verification of the Usefulness of Personal Authentication with Aerial Input Numerals Using Leap Motion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 369–374, 2019; DOI: 10.25046/aj040548
Abstract:

With the progress of IoT, everything is going to be connected to the network. It will bring us a lot of benefits however some security risks will be occurred by connecting network. To avoid such problems, it is indispensable to strengthen security more than now. We focus on personal authentication as one of the security.…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
8 Pages, 671 KB Download PDF

Analysis of Information Security for a Voting Process for Sectional Governments in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 352–359, 2019; DOI: 10.25046/aj040546
Abstract:

Knowing about different events in several Latin American countries, as well as in Ecuador, in relation to data alteration, in the different sectional voting processes, it has been necessary to carry out a security analysis provided by the systems of choice in the different sectional governments of the country. The objective of this study is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,263 KB Download PDF

Improve the Accuracy of Short-Term Forecasting Algorithms by Standardized Load Profile and Support Regression Vector: Case study Vietnam

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 243–249, 2019; DOI: 10.25046/aj040530
Abstract:

Short-term load forecasting (STLF) plays an important role in building business strategies, ensuring reliability and safe operation for any electrical system. There are many different methods, including: regression models, time series, neural networks, expert systems, fuzzy logic, machine learning and statistical algorithms used for short-term forecasts. However, the practical requirement is how to minimize the…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
14 Pages, 1,172 KB Download PDF

Prediction of Non-Communicable Diseases Using Class Comparison Data Mining

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 193–206, 2019; DOI: 10.25046/aj040525
Abstract:

Data mining is recognized as an effective technique for extracting and retrieving valuable information or decision from the vast available data. Because of the nature of the functionality of medical centers and hospitals, their data centers contain a collection of valuable information about their patients. By properly processing these data, different applications can be developed…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 812 KB Download PDF

An Approach to Vulnerabilities, Threats and Risk in Voting Systems for Popular Elections in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 106–116, 2019; DOI: 10.25046/aj040315
Abstract:

The problems in information security regarding vulnerabilities, threats and risks in voting systems for popular election in Latin America and the world persist; because in most of the countries of the world there is no maturity in democracy and defined policies; the problems of confidentiality, integrity and authenticity in the electoral processes can be evidenced.…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 894 KB Download PDF

Estimation of Software Development Project Success using Fuzzy Logics

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 280–287, 2019; DOI: 10.25046/aj040236
Abstract:

To date, software development is vital since software is a critical element in information technology. Requirements gathering, planning, estimation, estimation, development, collaboration, testing, and deployment. The problem is when it is delivered, so it reduces the risk of the problem which could happen is important. Threat prediction should be made. It will be aimed at…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 992 KB Download PDF

Holistic Access Control and Privacy Infrastructure in Distributed Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 46–55, 2018; DOI: 10.25046/aj030604
Abstract:

This article discusses IoT security in situations whereby devices do not share the same security domains, which raises security, privacy and safety concerns. It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments. IoT deployments allow billions of connected physical devices to collect, process and share…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
19 Pages, 1,846 KB Download PDF

Framework for a Chemical Substance Reporting System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 459–477, 2018; DOI: 10.25046/aj030553
Abstract:

In this paper a chemical substance reporting system is presented to enable industry to assess the impacts of increasing chemical regulations. Chemical regulations impose the need to monitor, control and restrict the use of hazardous substances. As chemical substances become more regulated, industry requires mechanisms to identify potential business continuity risks, posed by increased regulation.…

Read More
(This article belongs to Section Chemical Engineering (ENC))
Open AccessArticle
14 Pages, 1,293 KB Download PDF

An Overview of Data Center Metrics and a Novel Approach for a New Family of Metrics

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 238–251, 2018; DOI: 10.25046/aj030228
Abstract:

Data centers’ mission critical nature, significant power consumption, and increasing reliance on them for digital information, have created an urgent need to monitor and adequately manage these facilities. Metrics are a key part of this effort as their indicators raise flags that lead to optimization of resource utilization. A thorough review of existing data center…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
7 Pages, 276 KB Download PDF

The Internet of Things ecosystem: the blockchain and data protection issues

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 1–7, 2018; DOI: 10.25046/aj030201
Abstract:

The IoT is innovative and important phenomenon prone to several services and applications such as the blockchain which an emerging phenomenon. We can describe the blockchain as blockchain as a service because of the opportunity to use several applications based on this technology. We, indeed, should take into account the legal issues related to the…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 1,409 KB Download PDF

Smartphone Based Heart Attack Risk Prediction System with Statistical Analysis and Data Mining Approaches

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1815–1822, 2017; DOI: 10.25046/aj0203221
Abstract:

Nowadays, Ischemic Heart Disease (IHD) (Heart Attack) is ubiquitous and one of the major reasons of death worldwide. Early screening of people at risk of having IHD may lead to minimize morbidity and mortality. A simple approach is proposed in this paper to predict risk of developing heart attack using smartphone and data mining. Clinical…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 637 KB Download PDF

Source Code Vulnerabilities in IoT Software Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1502–1507, 2017; DOI: 10.25046/aj0203188
Abstract:

An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 702 KB Download PDF

Toward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 44–50, 2017; DOI: 10.25046/aj020406
Abstract:

The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 1,419 KB Download PDF

Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives.

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 88–99, 2017; DOI: 10.25046/aj020313
Abstract:

This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Meeting (ETCM)-2016. At that time, a methodological proposal was designed, implemented, and applied in a group of industrial plants for the management of the information security of the Industrial control systems (ICS). The present study displays an adaptation and…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026