Search Results

Results (7)

Search Parameters:

Keyword: Security System
Order results
Results per page
Open AccessArticle
7 Pages, 1,204 KB Download PDF

Toward a Smart Campus Using IoT: Framework for Safety and Security System on a University Campus

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 97–103, 2019; DOI: 10.25046/aj040512
Abstract:

Recently, there is an enormous research on the smart campus concept due to the revolution of the IoT technologies. The motivation of this paper is to: reinforce the safety on campus, reduce the cost, and take one step forward toward a University smart campus. In this paper, we are not only proposing a framework that…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 725 KB Download PDF

Proposal for a Security Model for a Popular Voting System Process in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 53–60, 2019; DOI: 10.25046/aj040507
Abstract:

In Latin America, there is a need for better security systems in different national or sectional votes, which is why this study was carried out, to show a proposal for a security model that helps to obtain better results and to this purpose has been selected information on the database for different Latin American countries,…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 892 KB Download PDF

A Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 43–50, 2018; DOI: 10.25046/aj030306
Abstract:

During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Telecommunications (TEL))
Open AccessArticle
7 Pages, 1,133 KB Download PDF

A Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1777–1783, 2017; DOI: 10.25046/aj0203217
Abstract:

Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 1,497 KB Download PDF

Prototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 139–150, 2022; DOI: 10.25046/aj070614
Abstract:

The constant evolution of Information and Communication Technologies, Internet, access to different free software, among others; they generate problems in the management of information security in companies; to mitigate risks, vulnerabilities, and information threats, an alternative was presented considering that information security systems are the basis for decision-making at the government, strategic, tactical, and operational…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 570 KB Download PDF

Dense Deep Neural Network Architecture for Keystroke Dynamics Authentication in Mobile Phone

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 307–314, 2020; DOI: 10.25046/aj050637
Abstract:

The ever-growing technology in mobile smartphones has enabled users to store sensitive and private information; as a result, it required the need for an improved security system. Previous approaches heavily relied on shallow machine learning algorithms that require feature extraction which is time consuming, laborious and can cause, resulting in poor authentication. In this paper,…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
11 Pages, 1,417 KB Download PDF

Design and Construction of a remote control switching device for household appliances application

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 154–164, 2017; DOI: 10.25046/aj020421
Abstract:

Remote control switching device for household application is a home device used to control the switching of household appliances from a distance. It serves to make the switching of household appliances easy for the elderly, physically challenged, the young and anyone who, in any circumstance, needs comfort and security. This paper develops a remote control…

Read More
(This article belongs to Section Electrical Engineering (ELE))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026