Search Results

Results (94)

Search Parameters:

Keyword: PTO
Order results
Results per page
Open AccessArticle
8 Pages, 1,553 KB Download PDF

Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 84–91, 2024; DOI: 10.25046/aj090308
Abstract:

Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
8 Pages, 1,226 KB Download PDF

Comparative Study of J48 Decision Tree and CART Algorithm for Liver Cancer Symptom Analysis Using Data from Carnegie Mellon University

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 57–64, 2023; DOI: 10.25046/aj080607
Abstract:

Liver cancer is a major contributor to cancer-related mortality both in the United States and worldwide. A range of liver diseases, such as chronic liver disease, liver cirrhosis, hepatitis, and liver cancer, play a role in this statistic. Hepatitis, in particular, is the main culprit behind liver cancer. As a consequence, it is decisive to…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Bioinformatics (BIF))
Open AccessArticle
10 Pages, 942 KB Download PDF

Extraction of Psychological Symptoms and Instantaneous Respiratory Frequency as Indicators of Internet Addiction Using Rule-Based Machine Learning

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 203–212, 2021; DOI: 10.25046/aj060522
Abstract:

Internet addiction (IA) has adverse effects on psychophysiological responses, interpersonal relationships, and academic and occupational performance. IA detection has received increasing attention. Although questionnaires enable long-term assessment (over 6 months) and physiological measurements to aid the short-term evaluation (over 2 min) of IA, the lack of algorithms results in an inability to detect IA in…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Psychiatry (PSY))
Open AccessArticle
5 Pages, 778 KB Download PDF

Quantum Secure Lightweight Cryptography with Quantum Permutation Pad

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 401–405, 2021; DOI: 10.25046/aj060445
Abstract:

Quantum logic gates represent certain quantum operations to perform quantum computations. Of those quantum gates, there is a category of classical behavior gates called quantum permutation gates. As a quantum algorithm, quantum permutation pad or QPP consists of multiple quantum permutation gates to be implemented both in a quantum computing system as a quantum circuit…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 366 KB Download PDF

Mobile Money Wallet Attack Resistance using ID-based Signcryption Cryptosystem with Equality Test

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 988–994, 2020; DOI: 10.25046/aj0506118
Abstract:

This paper is an extension of a research work presented at ICSIoT 2019. An attack continuum against the insider attack in mobile money security in Ghana using a witness based crypto- graphic method proposed by Alornyo et al. resisted the service provider from peddling with users data for economic gains. Our improved scheme achieves a…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 1,477 KB Download PDF

A Novel Approach to Augment the Opto-Electronic Properties of Stannic Oxide (SnO2) Thin Films by Vanadium Doping

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 169–174, 2020; DOI: 10.25046/aj050620
Abstract:

The Tin Oxide: Vanadium (SnO2: V) thin films have been deposited on glass substrates with various Vanadium concentration at a substrate temperature;500oC using microprocessor-controlled spray pyrolysis technique. The structural, compositional, morphological and optical analyses of the samples are characterized by XRD, EDAX, SEM and UV-Visible spectroscopy. The XRD analysis shows tetragonal rutile structure formation in…

Read More
(This article belongs to Section Coatings & Films in Materials Science (MCF))
Open AccessArticle
8 Pages, 1,124 KB Download PDF

Comparative Study of Cryptocurrency Algorithms: Coronavirus Towards Bitcoin’s Expansion

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 452–459, 2020; DOI: 10.25046/aj050556
Abstract:

The widespread presence of Coronavirus (COVID-19) is causing organizations and individuals major economics downsizing. The way this virus is transmitted from one individual to another is the real cause of the problem. For that, researchers in different fields started seriously looking for touch-less and contact-less exchange. Particularly in the finance world, cash transactions and keypad…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,015 KB Download PDF

New Algorithm for the Development of a Musical Words Descriptor for the Artificial Composition of Oriental Music

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 434–443, 2020; DOI: 10.25046/aj050554
Abstract:

The Music Composition Library of the great composers constitutes an intellectual heritage. This article introduces an algorithm of artificial Oriental composing music based on the descriptors determined on a large learning base to automatically write Oriental music as the logic identical to any composer. Musical words are called a grammatical alphabet. Each word derived is…

Read More
(This article belongs to the iraset-20 (Special Issue on Innovative Research in Applied Science, Engineering and Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 3,151 KB Download PDF

Multiscale Texture Analysis and Color Coherence Vector Based Feature Descriptor for Multispectral Image Retrieval

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 270–279, 2019; DOI: 10.25046/aj040634
Abstract:

Content Based Image Retrieval (CBIR) for remote sensing image data is a tedious process due to high resolution and complexity of image interpretation. Development of feature extraction technique is a major portion to represent the image content in an optimal way. In this paper, we propose a feature descriptor which combines the color coherent pixel…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 654 KB Download PDF

Multi-Step Iteration Algorithm of Total Asymptotically Quasi-Nonexpansive Maps

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 69–74, 2019; DOI: 10.25046/aj040311
Abstract:

In Banach spaces an iteration algorithm for two finite families of total asymptotically quasi-nonexpansive maps is introduced. Weak and strong convergence theorems of this algorithm to approximation common fixed points are proved by using suitable conditions. As well as, numerical example by using Mat-lab is given.

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Mathematics (MAT))
Open AccessArticle
5 Pages, 1,017 KB Download PDF

Morphological and Optoelectrical Characterization of Silicon Nanostructures for Photovoltaic Applications

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 45–49, 2019; DOI: 10.25046/aj040106
Abstract:

Metal (silver)-Assisted Chemical Etching (MACE) method is used to fabricate silicon nanostructures like silicon nanowires (SiNWs) and silicon nanocones (SiNCs). The morphological characterization of fabricated SiNWs has shown that 5 minutes is the optimal time of silver deposition on silicon substrate. Silicon nanocones (SiNCs) were also fabricated by etching vertical SiNWs with a AgNO3=HF=H2O2 solution.…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Multidisciplinary Materials Science (MMU))
Open AccessArticle
11 Pages, 948 KB Download PDF

Modified HOG Descriptor-Based Banknote Recognition System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 354–364, 2018; DOI: 10.25046/aj030541
Abstract:

This survey paper deals with the structural health monitoring systems on the basis of methodologies involving intelligent techniques. The intelligent techniques are the most popular tools for damage identification in terms of high accuracy, reliable nature and the involvement of low cost. In this critical survey, a thorough analysis of various intelligent techniques is carried…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
4 Pages, 531 KB Download PDF

Effect of Risperidone with Ondansetron to Control the Negative and Depressive Symptoms in Schizophrenia

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 100–103, 2018; DOI: 10.25046/aj030313
Abstract:

To evaluate the effects of Ondansetron on the negative and depressive symptoms of patients with schizophrenia. A double-blind randomized control trial was conducted in 2016-17 in Lahore. 30 participants were included both in placebo and medicine group. The patients were assessed by using the Positive and Negative Syndrome Scale (PANSS) and Hamilton’s Rating Scale for…

Read More
(This article belongs to Section Behavioral Sciences (BHS))
Open AccessArticle
12 Pages, 3,341 KB Download PDF

Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 271–282, 2018; DOI: 10.25046/aj030232
Abstract:

In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
10 Pages, 321 KB Download PDF

S-asymptotically w-periodic solutions in the p-th mean for a Stochastic Evolution Equation driven by Q-Brownian motion

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 124–133, 2017; DOI: 10.25046/aj020519
Abstract:

In this paper, we study the existence (uniqueness) and asymptotic stability of the p-th mean S-asymptotically !-periodic solutions for some nonautonomous Stochastic Evolution Equations driven by a Q-Brownian motion. This is done using the Banach fixed point Theorem and a Gronwall inequality.

Read More
(This article belongs to Section Applied Mathematics (MAP))
Open AccessArticle
12 Pages, 1,921 KB Download PDF

Cognitive Cybernetics vs. Captology

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 107–118, 2017; DOI: 10.25046/aj020614
Abstract:

In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
4 Pages, 631 KB Download PDF

A Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT) and Key Coloumnar Transposition (KCT) Method

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 31–34, 2017; DOI: 10.25046/aj020506
Abstract:

One Time Pad (OTP) is a cryptographic algorithm that is quite easy to be implemented. This algorithm works by converting plaintext and key into decimal then converting into binary number and calculating Exclusive-OR logic. In this paper, the authors try to make the comparison of OTP cryptography using KPI and KCT so that the ciphertext…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 827 KB Download PDF

Modification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 6–12, 2017; DOI: 10.25046/aj020502
Abstract:

Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 234 KB Download PDF

Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 1–5, 2017; DOI: 10.25046/aj020501
Abstract:

Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 984 KB Download PDF

S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 268–276, 2017; DOI: 10.25046/aj020336
Abstract:

Segmented and unsegmented 3D insulated copper through silicon vias (TSVs) of diameter 10 micro-meter, height 100 micro-meter and silicon of sizes 100 micro-meter by 100 micro-meter by 100 micro-meter are modeled using analysis system (ANSYS), equivalent circuit using advanced design system (ADS) at frequency ranges between 100MHz and 40GHz and 10MHz step size. The segmented…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
6 Pages, 734 KB Download PDF

Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 21–26, 2016; DOI: 10.25046/aj010505
Abstract:

Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
11 Pages, 2,600 KB Download PDF

Hardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 1, Page # 37–47, 2025; DOI: 10.25046/aj100105
Abstract:

Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
10 Pages, 494 KB Download PDF

Leveraging Machine Learning for a Comprehensive Assessment of PFAS Nephrotoxicity

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 62–71, 2024; DOI: 10.25046/aj090306
Abstract:

Polyfluoroalkyl substances (PFAS) are persistent chemicals that accumulate in the body and environment. Although recent studies have indicated that PFAS may disrupt kidney function, the underlying mechanisms and overall effects on the organ remain unclear. Therefore, this study aims to elucidate the impact of PFAS on kidney health using machine learning techniques. Utilizing a dataset…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Toxicology (TOX))
Open AccessArticle
8 Pages, 1,687 KB Download PDF

Double-Enhanced Convolutional Neural Network for Multi-Stage Classification of Alzheimer’s Disease

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 2, Page # 09–16, 2024; DOI: 10.25046/aj090202
Abstract:

Being known as an irreversible neurodegenerative disease which has no cure to date, detection and classification of Alzheimer’s disease (AD) in its early stages is significant so that the deterioration process can be slowed down. Generally, AD can be classified into three major stages, ranging from the “normal control” stage with no symptoms shown, the…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 1,350 KB Download PDF

Forecasting Bitcoin Prices: An LSTM Deep-Learning Approach Using On-Chain Data

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 3, Page # 186–192, 2023; DOI: 10.25046/aj080321
Abstract:

Over the past decade, Bitcoin’s unprecedented performance has underscored its po-sition as the premier asset class. Starting from an insignificant value and reaching an astounding high of around 65,000 U.S dollars in 2021 – all without a central con-trolling authority – Bitcoin’s trajectory is undoubtedly a historical feat. Its intangible nature, initially a subject of…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
1 2 3 4

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026