Search Results

Results (32)

Search Parameters:

Keyword: Verification
Order results
Results per page
Open AccessArticle
9 Pages, 714 KB Download PDF

The Model Development of an Effective Triggering System of Production Kanban Size towards Just-In-Time (JIT) Production

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 298–306, 2018; DOI: 10.25046/aj030535
Abstract:

The contents of this article consist of an extension original work presented at the 4th International Conference on Control, Automation and Robotics (ICCAR 2018) and aims to develop the systematic model of an effective triggering system of production Kanban size towards Just-In-Time (JIT) production system. The developed model was introduced based on the philosophy of…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Industrial Engineering (EID))
Open AccessArticle
15 Pages, 1,364 KB Download PDF

Design for Smaller, Lighter and Faster ICT Products: Technical Expertise, Infrastructures and Processes

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1114–1128, 2017; DOI: 10.25046/aj0203141
Abstract:

For the design of Information and Communications Technology (ICT) related products, basic level of technical expertise and simple development tools were enough in the early 1980s. As time goes by, new generation products designed by engineers are always expected to be smaller, lighter and faster, due to the increasing global competition and the application of…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,022 KB Download PDF

Verifying the Detection Results of Impersonation Attacks in Service Clouds

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 449–459, 2017; DOI: 10.25046/aj020358
Abstract:

A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 1,778 KB Download PDF

ADOxx Modelling Method Conceptualization Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 125–136, 2017; DOI: 10.25046/aj020317
Abstract:

The importance of Modelling Methods Engineering is equally rising with the importance of domain specific languages (DSL) and individual modelling approaches. In order to capture the relevant semantic primitives for a particular domain, it is necessary to involve both, (a) domain experts, who identify relevant concepts as well as (b) method engineers who compose a…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,780 KB Download PDF

Spatial Sampling Requirements for Received Signal Level Measurements in Cellular Networks of Suburban Area

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 277–287, 2017; DOI: 10.25046/aj020134
Abstract:

A process for the determination of a required spatial resolution in the collection of the Received Signal Level (RSL) is discussed. This method considers RSL measurements as a three dimensional surface that is sampled through the data collection process. In addition, it is difficult to collect RSL measurements for an entire coverage area because of…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))
Open AccessArticle
15 Pages, 1,137 KB Download PDF

Privacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 134–148, 2017; DOI: 10.25046/aj020116
Abstract:

Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))
Open AccessArticle
10 Pages, 739 KB Download PDF

System Testing Evaluation for Enterprise Resource Planning to Reduce Failure Rate

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 6–15, 2016; DOI: 10.25046/aj020102
Abstract:

Enterprise Resource Planning (ERP) systems are widely used applications to manage resources, communication and data exchange between different departments and modules with the purpose of managing the overall business process of the organization using one integrated software system. Due to the large scale and the complexity nature of these systems, many ERP implementation projects have…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Artificial Intelligence in Computer Science (CAI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026