Search Results

Results (241)

Search Parameters:

Section: cis
Order results
Results per page
Open AccessArticle
10 Pages, 924 KB Download PDF

Mission-Critical Systems Design Framework

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 128–137, 2018; DOI: 10.25046/aj030215
Abstract:

Safety-critical systems are well documented and standardized (e.g. IEC 61508, RTCA DO-178B) within system design cycles. However in Defence and Security, systems that are critical to the success of a Mission are not defined within the literature nor are there any guidelines in defining criticality in their design or operational capabilities. When it comes to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 276 KB Download PDF

The Internet of Things ecosystem: the blockchain and data protection issues

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 1–7, 2018; DOI: 10.25046/aj030201
Abstract:

The IoT is innovative and important phenomenon prone to several services and applications such as the blockchain which an emerging phenomenon. We can describe the blockchain as blockchain as a service because of the opportunity to use several applications based on this technology. We, indeed, should take into account the legal issues related to the…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
16 Pages, 3,319 KB Download PDF

Two-Stage Performance Engineering of Container-based Virtualization

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 521–536, 2018; DOI: 10.25046/aj030163
Abstract:

Cloud computing has become a compelling paradigm built on compute and storage virtualization technologies. The current virtualization solution in the Cloud widely relies on hypervisor-based technologies. Given the recent booming of the container ecosystem, the container-based virtualization starts receiving more attention for being a promising alternative. Although the container technologies are generally considered to be…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 344 KB Download PDF

A Joint Safety and Security Analysis of message protection for CAN bus protocol

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 384–393, 2018; DOI: 10.25046/aj030147
Abstract:

One of the prominent challenges of the automotive-transportation system is represented by the integration of security and safety properties within protocols, applications and connectivity mechanisms. A joint safety/security design can sometimes expose to trade-offs, since their requirements may not match perfectly or even be incompatible. This paper analyses an example of security and safety design,…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 421 KB Download PDF

Short CCA-Secure Attribute-Based Encryption

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 261–273, 2018; DOI: 10.25046/aj030132
Abstract:

Chosen-ciphertext attacks (CCA) are typical threat on public-key encryption schemes. We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme secure against CCA by individual techniques. Our modification works in the setting that the Diffie-Hellman tuple to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 1,062 KB Download PDF

Framework for the Formal Specification and Verification of Security Guidelines

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 38–48, 2018; DOI: 10.25046/aj030106
Abstract:

Ensuring the compliance of developed software with general and application-specific security requirements is a challenging task due to the lack of automatic and formal means to lead this verification. In this paper, we present our approach that aims at integrating the formal specification and verification of security guidelines in early stages of the development lifecycle…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 975 KB Download PDF

Building an Efficient Alert Management Model for Intrusion Detection Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 18–24, 2018; DOI: 10.25046/aj030103
Abstract:

This paper is an extension of work originally presented in WITS-2017 CONF. We extend our previous works by improving the Risk calculation formula, and risk assessment of an alert cluster instead of every single alert. Also, we presented the initial results of the implementation of our model based on risk assessment and alerts prioritization. The…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,040 KB Download PDF

A Multilingual System for Cyberbullying Detection: Arabic Content Detection using Machine Learning

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 275–284, 2017; DOI: 10.25046/aj020634
Abstract:

With the abundance of Internet and electronic devices bullying has moved its place from schools and backyards into cyberspace; to be now known as Cyberbullying. Cyberbullying is affecting a lot of children around the world, especially Arab countries. Thus concerns from cyberbullying are rising. A lot of research is ongoing with the purpose of diminishing…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 854 KB Download PDF

Distributing the computation in combinatorial optimization experiments over the cloud

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 136–144, 2017; DOI: 10.25046/aj020617
Abstract:

Combinatorial optimization is an area of great importance since many of the real-world problems have discrete parameters which are part of the objective function to be optimized. Development of combinatorial optimization algorithms is guided by the empirical study of the candidate ideas and their performance over a wide range of settings or scenarios to infer…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 1,921 KB Download PDF

Cognitive Cybernetics vs. Captology

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 107–118, 2017; DOI: 10.25046/aj020614
Abstract:

In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,133 KB Download PDF

A Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1777–1783, 2017; DOI: 10.25046/aj0203217
Abstract:

Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
16 Pages, 988 KB Download PDF

Pluggable Controllers and Nano-Patterns in Java with Lola

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1711–1726, 2017; DOI: 10.25046/aj0203211
Abstract:

Pluggable controllers are a different way to design control constructors such as if, while, do, switch, and operators such as short circuit con-junction (&&) and the “?.” operator of the Swift programming language. Adoption of pluggable controllers enables the final user to modify and extend the control flow constructs (if, while, etc.) of an underlying…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 546 KB Download PDF

On the Performance of a Clustering-based Task Scheduling in a Heterogeneous System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1540–1548, 2017; DOI: 10.25046/aj0203192
Abstract:

Recent task scheduling algorithms for a generalized workflow job in heterogeneous system adopt list-based scheduling. In those algorithms, the response time cannot be effectively reduced if the given workflow job is data-intensive. If the workflow job is computationally intensive, an attempt is made to assign tasks to many processors, which can lead to resource starvation.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 757 KB Download PDF

An Efficient Authentication Method For Smart Card Verification In Online

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 133–138, 2017; DOI: 10.25046/aj020418
Abstract:

The great cards are getting a charge out of a critical part inside the on-line managing wherever we have tendency to can’t check the cardholder up close and personal. The phishing sites may parody the data in the middle of the customer website and along these lines the common webpage. To protect the data and…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 2,207 KB Download PDF

A Machine Learning based Framework for Parameter based Multi-Objective Optimisation of Video CODECs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1515–1526, 2017; DOI: 10.25046/aj0203190
Abstract:

All multimedia devices now incorporate video CODECs that comply with international video coding standards such as H.264 / MPEG4-AVC and the new High Efficiency Video Coding Standard (HEVC), otherwise known as H.265. Although the standard CODECs have been designed to include algorithms with optimal efficiency, a large number of coding parameters can be used to…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 637 KB Download PDF

Source Code Vulnerabilities in IoT Software Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1502–1507, 2017; DOI: 10.25046/aj0203188
Abstract:

An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 827 KB Download PDF

Proposal for a Visualization System of Purchase Relationship Using ID-POS Data

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1290–1297, 2017; DOI: 10.25046/aj0203163
Abstract:

In recent years, big data analysis is gaining immense credence in the fields of academics and business. Businesses such as management and marketing have demonstrated a strong inclination and interest in data analytics. However, many businesses are unable to utilize data even if they have access to it. The main reason for that is the…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 445 KB Download PDF

Towards Deployment Strategies for Deception Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1272–1279, 2017; DOI: 10.25046/aj0203161
Abstract:

Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
4 Pages, 673 KB Download PDF

Efficient Tensor Strategy for Recommendation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 111–114, 2017; DOI: 10.25046/aj020415
Abstract:

The era of big data has witnessed the explosion of tensor datasets, and large scale Probabilistic Tensor Factorization (PTF) analysis is important to accommodate such increasing trend of data. Sparsity, and Cold-Start are some of the inherent problems of recommender systems in the era of big data. This paper proposes a novel Sentiment-Based Probabilistic Tensor…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 720 KB Download PDF

IoT: Their Conveniences, Security Challenges and Possible Solutions

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1211–1217, 2017; DOI: 10.25046/aj0203153
Abstract:

The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 13,274 KB Download PDF

Precision Statistical Analysis of Images Based on Brightness Distribution

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 99–104, 2017; DOI: 10.25046/aj020413
Abstract:

Study the content of images is considered an important topic in which reasonable and accurate analysis of images are generated. Recently image analysis becomes a vital field because of huge number of images transferred via transmission media in our daily life. These crowded media with images lead to highlight in research area of image analysis.…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 781 KB Download PDF

Improving the Performance of Fair Scheduler in Hadoop

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1050–1058, 2017; DOI: 10.25046/aj0203133
Abstract:

Cloud computing is a power platform to deal with big data. Among several software frameworks used for the construction of cloud computing systems, Apache Hadoop, which is an open-source software, becomes a popular one. Hadoop supports for distributed data storage and the process of large data sets on computer clusters based on a MapReduce parallel…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 3,909 KB Download PDF

Optimal Plant Growth in Smart Farm Hydroponics System using the Integration of Wireless Sensor Networks into Internet of Things

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1006–1012, 2017; DOI: 10.25046/aj0203127
Abstract:

Greenhouse cultivation is easy to keep up and control important factors such as light, temperature, and humidity. Using of sensors and actuators in the greenhouse to capture different values allows for the control of the equipment, it can also be optimized for growth at optimal temperature and humidity of various crops planted. We use wireless…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 933 KB Download PDF

Graphics on demand: the automatic data visualization on the WEB

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 951–957, 2017; DOI: 10.25046/aj0203120
Abstract:

Data visualization is an effective tool for communicating the results of opinion surveys, epidemiological studies, statistics on consumer habits, etc. The graphical representation of data usually assists human information processing by reducing demands on attention, working memory, and long-term memory. It allows, among other things, a faster reading of the information (by acting on the…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 757 KB Download PDF

Features based approach for indexation and representation of unstructured Arabic documents

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 900–905, 2017; DOI: 10.25046/aj0203112
Abstract:

The increase of textual information published in Arabic language on the internet, public libraries and administrations requires implementing effective techniques for the extraction of relevant information contained in large corpus of texts. The purpose of indexing is to create a document representation that easily find and identify the relevant information in a set of documents.…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026