Search Results

Results (36)

Search Parameters:

Keyword: Trust
Order results
Results per page
Open AccessArticle
16 Pages, 1,131 KB Download PDF

A Novel Representative k-NN Sampling-based Clustering Approach for an Effective Dimensionality Reduction-based Visualization of Dynamic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 08–23, 2020; DOI: 10.25046/aj050402
Abstract:

Visualization plays a crucial role in the exploratory analysis of Big Data. The direct visualization of Big Data is a challenging task and difficult to analyze. Dimensionality Reduction techniques extract the features in the context of visualization. Due to the unsupervised and non-parametric nature, most of the dimensionality reduction techniques are not evaluated quantitatively and…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 2,283 KB Download PDF

A Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 518–528, 2020; DOI: 10.25046/aj050364
Abstract:

It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 768 KB Download PDF

Generating a Blockchain Smart Contract Application Framework

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 191–197, 2020; DOI: 10.25046/aj050325
Abstract:

Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 746 KB Download PDF

Comparison Analysis between Mobile Banking and Mobile Payment as Determinant Factors of Customer Privacy

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 469–475, 2020; DOI: 10.25046/aj050260
Abstract:

Mobile banking and mobile payment are currently always used by customers for financial payments. With customer payments, it is usually easier to make payments with mobile payment, because it is more practical and direct than mobile banking. However, is the privacy of both platforms understood by the customer? Research questions to be answered: 1) What…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 883 KB Download PDF

A Comprehensive Study of Privacy Preserving Techniques in Cloud Computing Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 419–424, 2020; DOI: 10.25046/aj050254
Abstract:

The huge growth in cloud storage utilization over the past years has made a big demand for an advanced technique and strong tools to make services even more practical and secure. Data privacy in cloud computing has become one of the biggest concerns for both individuals and organizations which adds more pressure on cloud service…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
7 Pages, 1,496 KB Download PDF

New Color Image Encryption for Medical Images Based on Three Dimensional Generalized Chaotic Cat Map and Combined Cellular Automata

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 104–110, 2020; DOI: 10.25046/aj050213
Abstract:

Medical images are transmitted via the Internet or the hospital intranet which include many important information about the patient’s personal information. Medical image encryption is a technology that can effectively protect the information contained in these medical images. In this paper, we give a secure and trusty Combined Cellular Automata (CoCA) based medical image encryption…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Telecommunications (TEL))
Open AccessArticle
13 Pages, 811 KB Download PDF

Computer Security as an Engineering Practice: A System Engineering Discussion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 357–369, 2019; DOI: 10.25046/aj040245
Abstract:

We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
17 Pages, 4,140 KB Download PDF

Critical Embedded Systems Development Using Formal Methods and Statistical Reliability Metrics

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 231–247, 2019; DOI: 10.25046/aj040123
Abstract:

Trusted systems are becoming more integrated into everyday life. Security and reliability are at the forefront of trusted system design and are often directed at hardware-only solutions, especially for safety critical systems. This is because hardware has a well-established process for achieving strong, precise, and reliable systems. These attributes have been achieved in the area…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
8 Pages, 910 KB Download PDF

Probabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 281–288, 2018; DOI: 10.25046/aj030636
Abstract:

This article is devoted to the issues of ensuring the security of a group of mobile robots in the implementation of attacks aimed at the property of accessibility of information and the availability of network nodes. The article presents a method for detecting an abnormal behavior of a network node based on the analysis by…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 730 KB Download PDF

Actual Use and Continuous Use of Retail Mobile App: A Model Comparison Perspective

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 151–158, 2018; DOI: 10.25046/aj030619
Abstract:

A mobile retail app is a growing innovation in a retailing setting and there is an argument on the prominent status of a mobile application in contrast with a mobile website and web applications. The study used quantitative data to run multiple regression analysis with keen attention to linear regression assumption and compare four models…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 992 KB Download PDF

Holistic Access Control and Privacy Infrastructure in Distributed Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 46–55, 2018; DOI: 10.25046/aj030604
Abstract:

This article discusses IoT security in situations whereby devices do not share the same security domains, which raises security, privacy and safety concerns. It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments. IoT deployments allow billions of connected physical devices to collect, process and share…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026