Search Results

Results (6)

Search Parameters:

Keyword: Computer systems
Order results
Results per page
Open AccessArticle
8 Pages, 625 KB Download PDF

Based on Reconfiguring the Supercomputers Runtime Environment New Security Methods

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 291–298, 2020; DOI: 10.25046/aj050338
Abstract:

This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,070 KB Download PDF

A Proposal of Code Modification Problem for Self-study of Web Client Programming Using JavaScript

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 5, Page # 53–61, 2022; DOI: 10.25046/aj070508
Abstract:

In current societies, web application systems take central roles in computer systems. Thus, web client programming using JavaScript has increased values to add dynamic features and functions in web pages by well working with HTML and CSS. In this paper, as a new type of exercise problem for its self-study, we propose a code modification…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
7 Pages, 930 KB Download PDF

A Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 317–323, 2020; DOI: 10.25046/aj050341
Abstract:

Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 657 KB Download PDF

New Neural Networks for the Affinity Functions of Binary Images with Binary and Bipolar Components Determining

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 91–99, 2021; DOI: 10.25046/aj060411
Abstract:

The Hamming neural network is an effective tool for solving problems of recognition and classification of objects, the components of which are encoded using a binary bipolar alphabet, and as a measure of the objects’ proximity the difference between the number of identical bipolar components which compared include objects and the Hamming distance between them…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 319 KB Download PDF

Stream Cipher by Reed-Solomon Codes

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 26–32, 2018; DOI: 10.25046/aj030404
Abstract:

Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
5 Pages, 368 KB Download PDF

An Encryption Key for Secure Authentication: The Dynamic Solution

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 540–544, 2017; DOI: 10.25046/aj020369
Abstract:

In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026