Search Results

Results (19)

Search Parameters:

Keyword: AES
Order results
Results per page
Open AccessArticle
8 Pages, 1,553 KB Download PDF

Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 84–91, 2024; DOI: 10.25046/aj090308
Abstract:

Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
9 Pages, 705 KB Download PDF

Strengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 33–41, 2024; DOI: 10.25046/aj090104
Abstract:

This work enhances the LoRaWAN server framework, focusing on an innovative approach for robust security and dynamic data visualization in network management. Migrating from RVC4 to AES encryption, it fortifies the network’s defense against cyber threats, a crucial advancement in IoT security. Furthermore, the integration with Grafana’s mapping plugin capitalizes on geolocation data, a strategic…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Network Engineering (ENW))
Open AccessArticle
6 Pages, 881 KB Download PDF

EAES: Extended Advanced Encryption Standard with Extended Security

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 51–56, 2018; DOI: 10.25046/aj030307
Abstract:

Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 373 KB Download PDF

Doubly Nonlinear Parabolic Systems In Inhomogeneous Musielak- Orlicz-Sobolev Spcaes

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 180–192, 2017; DOI: 10.25046/aj020526
Abstract:

In this paper, we discuss the solvability of the nonlinear parabolic systems associated to the nonlinear parabolic equation: \(\frac{\partial b_{i}(x,u_{i})}{\partial t} -div(a(x,t,u_{i},\nabla u_{i}))- \phi_{i}(x,t,u_{i})) +f_{i}(x,u_{1},u_{2})=0\) where the function  \(b_{i}(x,u_{i})\) verifies some regularity conditions, the term \(\Big(a(x,t,u_{i},\nabla u_{i})\Big)\) is a generalized Leray-Lions operator and \(\phi_{i}\) is a Caratheodory function assumed to be  Continuous on \(u_i\) and satisfy only a…

Read More
(This article belongs to Section Applied Mathematics (MAP))
Open AccessArticle
4 Pages, 566 KB Download PDF

Combination of Caesar Cipher Modification with Transposition Cipher

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 22–25, 2017; DOI: 10.25046/aj020504
Abstract:

The caesar cipher modification will be combine with the transposition cipher, it would be three times encryption on this experiment that is caesar modification at first then the generated ciphertext will be encrypted with transposition, and last, the result from transposition will be encrypted again with the second caesar modification, similarly at the decryption but…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 827 KB Download PDF

Modification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 6–12, 2017; DOI: 10.25046/aj020502
Abstract:

Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,776 KB Download PDF

A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 420–426, 2017; DOI: 10.25046/aj020354
Abstract:

Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
11 Pages, 285 KB Download PDF

Generative Artificial Intelligence and Prompt Engineering: A Comprehensive Guide to Models, Methods, and Best Practices

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 2, Page # 01–11, 2025; DOI: 10.25046/aj100201
Abstract:

This article enhances discussions on Generative Artificial Intelligence (GenAI) and prompt engineering by exploring critical pitfalls and industry-specific advantages. It begins with a foundational overview of AI evolution, emphasizing how generative models such as GANs, VAEs, and Transformers have revolutionized language processing, image generation, and drug discovery. Prompt engineering is highlighted as a key methodology…

Read More
(This article belongs to the SP18 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2025) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
11 Pages, 802 KB Download PDF

Antecedents to Learners’ Satisfaction with Serious Games: An Investigation Using Partial Least Square

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 6, Page # 43–53, 2021; DOI: 10.25046/aj060607
Abstract:

Serious games are at the forefront of discussions about the future of learning. Research shows that they can help improve student motivation and knowledge transfer by making learning experiences more pleasurable. Teaching practices are increasingly enhanced or complemented by serious games; skills and knowledge are developed by recreating realistic situations allowing learners to enhance their…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 778 KB Download PDF

Quantum Secure Lightweight Cryptography with Quantum Permutation Pad

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 401–405, 2021; DOI: 10.25046/aj060445
Abstract:

Quantum logic gates represent certain quantum operations to perform quantum computations. Of those quantum gates, there is a category of classical behavior gates called quantum permutation gates. As a quantum algorithm, quantum permutation pad or QPP consists of multiple quantum permutation gates to be implemented both in a quantum computing system as a quantum circuit…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 801 KB Download PDF

Design and Development of an Advanced Affordable Wearable Safety Device for Women: Freedom Against Fearsome

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 829–836, 2021; DOI: 10.25046/aj060296
Abstract:

Harassment and violence against women have become one of the social security problems in Bangladesh. In this paper, we aim to develop safety devices for women named BOHNNI and BADHON which resemble legitimate jewelry. We used a microcontroller for the hardware device to make it most decisive and less immoderate. BOHNNI, a locating device, is…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 932 KB Download PDF

Analysis of qCON and qNOX Anesthesia Indices and EEG Spectral Energy during Natural Sleep Stages

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 1328–1333, 2021; DOI: 10.25046/aj0601152
Abstract:

The objective of this research is to study the behaviour of the anaesthesia monitor Conox during natural sleep to open the gate for this devices to assess subjects during this stage. The values of qCON and qNOX indices and EEG frequency bands are analysed during night sleep of 10 volunteers when they lose consciousness, in…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Bioinformatics (BIF))
Open AccessArticle
7 Pages, 2,069 KB Download PDF

The Probe Mark Discoloration on Bond Pad and Wafer Storage

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 416–422, 2020; DOI: 10.25046/aj050650
Abstract:

In this report, a probe mark discoloration with donut/circle shape was found. The corrosion formed on Aluminum bond pads. The SEM/EDS, TEM/EELS & AES surface techniques were used to identify this corrosion product. All these material analysis results pointed out the role of fluorine to this discoloration. The HAST testing, all the chip samples obtained…

Read More
(This article belongs to the iraset-20 (Special Issue on Innovative Research in Applied Science, Engineering and Technology 2020) & Section Characterization & Testing in Materials Science (MCT))
Open AccessArticle
7 Pages, 495 KB Download PDF

Performance Evaluation and Examination of Data Transfer: A Review of Parallel Migration in Cloud Storage

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 57–63, 2020; DOI: 10.25046/aj050207
Abstract:

Recent years have seen a continued pattern of development in the cloud computing field. Numerous approaches to maximize file transfer capacity are still completely standing for use on cloud computing storage; however, they do not maximize the advantage of data migration scalability and elasticity in cloud storage. One potential problem is that elasticity takes time;…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 678 KB Download PDF

An Immutable Algorithm Approach to Improve the Information Security of a Process for a Public Organization of Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 25–30, 2019; DOI: 10.25046/aj040304
Abstract:

Currently, information security is among the main characteristics that must be achieved within the security of private and public organizations worldwide. For this reason, globally recognized algorithms such as the AES, IDEA, RC5, DES, RSA are researched with the aim of identifying the most suitable and obtaining a greater degree of security and speed of…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 834 KB Download PDF

Learning Personalization Based on Learning Style instruments

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 108–115, 2018; DOI: 10.25046/aj030315
Abstract:

Adaptive education systems (AES) are considered one of the most interesting research topics in technology-based learning strategies. Since students have different abilities, needs and learning styles, we should fit the curriculum and teaching activities to these different learning styles. This study investigates the impact of using LAES (Libyan Adaptive Education System) on the performance of…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 2,979 KB Download PDF

ARMA feeding techniques for isoflux coverage from a micro satellite

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 63–69, 2017; DOI: 10.25046/aj020608
Abstract:

This paper deals with the design of a new reconfigurable beam antenna used to improve the efficiency of spatial telemetry links on Nano-Satellite. This agile beam antenna is not built on the well-known array concept AESA (Agile Electronically Scanned Array) but using a new one called ARMA (Agile Matrix Radiating Antenna); MARPEM in French. In…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Telecommunications (TEL))
Open AccessArticle
5 Pages, 368 KB Download PDF

An Encryption Key for Secure Authentication: The Dynamic Solution

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 540–544, 2017; DOI: 10.25046/aj020369
Abstract:

In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
15 Pages, 1,137 KB Download PDF

Privacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 134–148, 2017; DOI: 10.25046/aj020116
Abstract:

Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026