Search Results

Results (241)

Search Parameters:

Section: cis
Order results
Results per page
Open AccessArticle
12 Pages, 264 KB Download PDF

Using Privacy Enhancing and Fine-Grained Access Controlled eKYC to implement Privacy Aware eSign

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 347–358, 2019; DOI: 10.25046/aj040443
Abstract:

eSign is an online electronic signature service which is recently gaining more prominence in India. eSign is based on two online services from UIDAI, viz. a viz., Aadhaar based authentication and retrieval of resident’s eKYC information after taking his/her consent. With increased adoption of Aadhaar based services, privacy of user data has become more and…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 696 KB Download PDF

Prototype of a Security Architecture for a System of Electronic Voting for the Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 292–299, 2019; DOI: 10.25046/aj040437
Abstract:

To be able to perform a better voting system, it is important to go to ICT and its various platforms designed for electoral purposes, which are being used in several countries in Latin America. In Ecuador are being used digital mechanisms during the process, but with certain errors and he is being considered to implement…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 795 KB Download PDF

Exploring of The Employee Information Management System using HOT-Fit and UTAUT2 Model

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 106–114, 2019; DOI: 10.25046/aj040412
Abstract:

Information Systems are a combination of information technology and activities of people who use these technologies to support operations, management, data, and technology. Based on Indonesian Minister of Home Affairs Decree No. 17 of 2000, the Regional Office of the Ministry of Law and Human Rights of West Sulawesi implements the Employee Management Information System…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 1,122 KB Download PDF

Proposal of Ledger Technology to Apply to a Public Organization in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 251–259, 2019; DOI: 10.25046/aj040333
Abstract:

Ledger technology has now changed financial systems around the world, applying this technology to the improvement of the public sector, mainly to the debt collection system, we improve the speed of payment and its immediate registration, we make use of the advantages of Ledger technology with respect to reliability, security and speed. The objective is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 812 KB Download PDF

An Approach to Vulnerabilities, Threats and Risk in Voting Systems for Popular Elections in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 106–116, 2019; DOI: 10.25046/aj040315
Abstract:

The problems in information security regarding vulnerabilities, threats and risks in voting systems for popular election in Latin America and the world persist; because in most of the countries of the world there is no maturity in democracy and defined policies; the problems of confidentiality, integrity and authenticity in the electoral processes can be evidenced.…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 678 KB Download PDF

An Immutable Algorithm Approach to Improve the Information Security of a Process for a Public Organization of Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 25–30, 2019; DOI: 10.25046/aj040304
Abstract:

Currently, information security is among the main characteristics that must be achieved within the security of private and public organizations worldwide. For this reason, globally recognized algorithms such as the AES, IDEA, RC5, DES, RSA are researched with the aim of identifying the most suitable and obtaining a greater degree of security and speed of…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 1,022 KB Download PDF

Behavioral Analysis of Bitcoin Users on Illegal Transactions

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 402–412, 2019; DOI: 10.25046/aj040250
Abstract:

Bitcoin is a popular crypto currency that is used as a mode of investment and a medium for trading goods and services. Anonymity, security and decentralization are significant features of Bitcoin. This creates several opportunities for criminals to involve in illegal and fraudulent activities. This research study aimed to automate the process of gaining the…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 850 KB Download PDF

Relational Databases Versus HBase: An Experimental Evaluation

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 395–401, 2019; DOI: 10.25046/aj040249
Abstract:

Relational database management systems (RDBMS) have been imposed for more than three decades as a facto standard for data storage, management, and analysis. They have a good reputation by supporting ACID properties (Atomicity, Consistency, Isolation, and Durability) and by adopting the SQL language which has become a standardized language. However, despite their power, RDBMS have…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 894 KB Download PDF

Estimation of Software Development Project Success using Fuzzy Logics

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 280–287, 2019; DOI: 10.25046/aj040236
Abstract:

To date, software development is vital since software is a critical element in information technology. Requirements gathering, planning, estimation, estimation, development, collaboration, testing, and deployment. The problem is when it is delivered, so it reduces the risk of the problem which could happen is important. Threat prediction should be made. It will be aimed at…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 600 KB Download PDF

Designing IT Blue Print Academic System on Higher Education with Togaf

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 244–250, 2019; DOI: 10.25046/aj040232
Abstract:

STIE XYZ is one of the universities of economics that has not been optimal in the use of information technology. IT implementation is applied when there are urgent and sudden needs. So it is not planned carefully according to the development needs of this educational institution. Therefore many patchy applications are created. As the consequence,…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 739 KB Download PDF

Multiple Social Metrics Based Routing Protocol in Opportunistic Mobile Social Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 176–182, 2019; DOI: 10.25046/aj040223
Abstract:

In Opportunistic Mobile social networks (OMSNs), the social characteristics and behavior of humans carrying mobile devices are exploited to improve information provision and data routing in the network. Social-based routing algorithms attempt to exploit users’ social features such as similarity, centrality and betweenness, singularly or combined, to select a suitable relay node among neighbors. However,…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 746 KB Download PDF

Development & Implementation of Smart Vehicle Over Speeding Detector using IoT

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 170–175, 2019; DOI: 10.25046/aj040222
Abstract:

Nowadays over speeding is one of the most common traffic violations. Generally, over speeding is the result of restless and bad behavior of drivers. As the accident rates are increasing it is important to develop and implement a system which can automatically detect and report over speeding to the traffic control authorities as early as…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 730 KB Download PDF

Actual Use and Continuous Use of Retail Mobile App: A Model Comparison Perspective

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 151–158, 2018; DOI: 10.25046/aj030619
Abstract:

A mobile retail app is a growing innovation in a retailing setting and there is an argument on the prominent status of a mobile application in contrast with a mobile website and web applications. The study used quantitative data to run multiple regression analysis with keen attention to linear regression assumption and compare four models…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 2,405 KB Download PDF

Management Tool for the “Nephele” Data Center Communication Agent

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 144–150, 2018; DOI: 10.25046/aj030618
Abstract:

Optical switching provided the means for the development of Data Centers with high throughput interconnection networks. A significant contribution to the advanced optical Data Centers designs is the Nephele architecture that employs optical data planes, optical Points of Delivery (PoD) switches and Top of Rack (ToR) switches equipped with 10 Gbps connections to the PoDs…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 947 KB Download PDF

Analysis and Methods on The Framework and Security Issues for Connected Vehicle Cloud

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 105–110, 2018; DOI: 10.25046/aj030611
Abstract:

In the world today, the rapid development of the Internet of Things (IoT) and the application of the Connected Vehicle Cloud (CVC) as the Internet of Things in the intelligent transportation are becoming widespread. They can improve people’s safety, vehicle security as well as reduce the cost of ownership of an automobile. At the same…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 921 KB Download PDF

Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 311–320, 2018; DOI: 10.25046/aj030537
Abstract:

Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network. However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 1,495 KB Download PDF

Proposed System of New Generation LMS Using Visual Models to Accelerate Language Acquisition

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 277–287, 2018; DOI: 10.25046/aj030533
Abstract:

Language skill is a rule-like operation, based on generalized connections. The main property of language skills is awareness. They are formed with conscious mastery of the language means of communication (phonetic, lexical and grammatical). Language acquisition is a complex process which includes a large number of different parameters. Therefore, the study and improvement of language…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 2,468 KB Download PDF

SDN-based Network Control Method for Distributed Storage Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 140–151, 2018; DOI: 10.25046/aj030518
Abstract:

With the increasing need for effective storage management due to ever-growing content-generation over the Internet, Distributed Storage Systems (DSS) has arisen as a valuable tool. Although DSS has considerably improved in the past years, it still leverages legacy techniques in its networking. To cope with the demanding requirements, Software Defined Networking (SDN) has revolutionized the…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 1,595 KB Download PDF

Virtual Output Queues Architecture for High Throughput Data Center Nodes

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 97–104, 2018; DOI: 10.25046/aj030513
Abstract:

The latest design approach for Data Centers (DCs) follows the direction of exploiting optical switching to connect Top-of-Rack (ToR) switches that serve thousands of data storing and computing devices. A ToR’s usual function is the Virtual Output Queues (VOQs), which is the prevalent solution for the head-of-line blocking problem of the DC switches. An effective…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
14 Pages, 3,427 KB Download PDF

Supporting Active Aging Through A Home Automation Infrastructure for Social Internet of Things

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 173–186, 2018; DOI: 10.25046/aj030415
Abstract:

The number of smart devices inside the living environments grows more and more every day, and with it the need to interface them in order to share data and activate functions. Each day, new scenarios and new applications emerge to make our lives easier in many different contexts. The AAL SOCIALIZE project aims to create…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,010 KB Download PDF

Effectiveness of Routing Protocols for Different Networking Scenarios

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 112–121, 2018; DOI: 10.25046/aj030412
Abstract:

Selection of a routing protocol is vital for modern arena of Internet communication as network traffic and network complexities are rapidly increasing. This paper evaluates the effectiveness of three routing protocols namely routing information protocol version 2 (RIPv2), open shortest path first (OSPF), enhanced interior gateway routing protocol (EIGRP), and hybrid protocols based on these…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 319 KB Download PDF

Stream Cipher by Reed-Solomon Codes

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 26–32, 2018; DOI: 10.25046/aj030404
Abstract:

Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 918 KB Download PDF

A Survey on Parallel Multicore Computing: Performance & Improvement

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 152–160, 2018; DOI: 10.25046/aj030321
Abstract:

Multicore processor combines two or more independent cores onto one integrated circuit. Although it offers a good performance in terms of the execution time, there are still many metrics such as number of cores, power, memory and more that effect on multicore performance and reduce it. This paper gives an overview about the evolution of…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 881 KB Download PDF

EAES: Extended Advanced Encryption Standard with Extended Security

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 51–56, 2018; DOI: 10.25046/aj030307
Abstract:

Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
5 Pages, 1,361 KB Download PDF

The impact of Big Data on the Android Mobile Platform for Natural Disaster Situations

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 206–210, 2018; DOI: 10.25046/aj030224
Abstract:

This application developing for the project OCEMA comes as result of architecture building in Android, then the development of a professional modeling in Talend Open Studio for Big Data, which enabled the integration of data from many data sources. One of its uses is the quick identification of people found in areas affected by natural…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026