Search Results

Results (31)

Search Parameters:

Keyword: TWI
Order results
Results per page
Open AccessArticle
9 Pages, 884 KB Download PDF

Automated Text Annotation for Social Media Data during Natural Disasters

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 119–127, 2018; DOI: 10.25046/aj030214
Abstract:

Nowadays, text annotation plays an important role within real-time social media mining. Social media analysis provides actionable information to its users in times of natural disasters. This paper presents an approach to a real-time two layer text annotation system for social media stream to the domain of natural disasters. The proposed system annotates raw tweets…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 2,704 KB Download PDF

Signal-Based Metamodels for Predictive Reliability Analysis and Virtual Testing

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 342–347, 2018; DOI: 10.25046/aj030141
Abstract:

In the current industrial development, an increasing number of sensors is applied for monitoring of any kind of appliances and machines. A predictive mathematical model allows for realistic assessment of the health state of the appliance, indication of service requirements, as well as control of the appliance, serving as so-called digital twin on a control…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Aerospace Engineering (EAR))
Open AccessArticle
13 Pages, 421 KB Download PDF

Short CCA-Secure Attribute-Based Encryption

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 261–273, 2018; DOI: 10.25046/aj030132
Abstract:

Chosen-ciphertext attacks (CCA) are typical threat on public-key encryption schemes. We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme secure against CCA by individual techniques. Our modification works in the setting that the Diffie-Hellman tuple to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
16 Pages, 988 KB Download PDF

Pluggable Controllers and Nano-Patterns in Java with Lola

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1711–1726, 2017; DOI: 10.25046/aj0203211
Abstract:

Pluggable controllers are a different way to design control constructors such as if, while, do, switch, and operators such as short circuit con-junction (&&) and the “?.” operator of the Swift programming language. Adoption of pluggable controllers enables the final user to modify and extend the control flow constructs (if, while, etc.) of an underlying…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
5 Pages, 639 KB Download PDF

A Modified Patch Antenna with Square-Open Loop Resonator Slot for Improved Bandwidth Performance in WiFi Applications

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1467–1471, 2017; DOI: 10.25046/aj0203183
Abstract:

A novel, modified square patch antenna with square open loop resonator slot, operating at 5.5 GHz, for improved bandwidth performance is proposed in this article. A complementary square open loop resonator is introduced on the patch to enhance the bandwidth more than twice that of the conventional square patch antenna operating at the same frequency.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
7 Pages, 1,258 KB Download PDF

A security approach based on honeypots: Protecting Online Social network from malicious profiles

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 198–204, 2017; DOI: 10.25046/aj020326
Abstract:

In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026