Search Results

Results (8)

Search Parameters:

Keyword: Token
Order results
Results per page
Open AccessArticle
13 Pages, 1,308 KB Download PDF

Waterfall: Salto Collazo. High-Level Design of Tokenomics

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 3, Page # 231–243, 2023; DOI: 10.25046/aj080326
Abstract:

This article explains the fundamental principles of the economic policy that are integrated into the decentralized public platform Waterfall. The platform has a DAG (Directed Acyclic Graph) based system architecture and is designed to develop decentralized applications and financial services. The main goal of this work is to create a favorable environment that incentivizes positive…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
15 Pages, 366 KB Download PDF

Leakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 156–170, 2022; DOI: 10.25046/aj070216
Abstract:

Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 779 KB Download PDF

Blockchain-Based Decentralized Digital Self-Sovereign Identity Wallet for Secure Transaction

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 977–983, 2021; DOI: 10.25046/aj0602112
Abstract:

Blockchain (BC) as the widespread innovations in the 21st century has recognized itself to be immutable, tamper-resistant, decentralize and secure. This emerging technology is used as a functional technology for refining present technology and forming new applications for its robustness and disintermediation. Decentralized Digital Self-Sovereign Identity (DDSSI) is an identity mapped with individual identity information…

Read More
(This article belongs to Section Theory & Methods in Computer Science (CTM))
Open AccessArticle
13 Pages, 1,145 KB Download PDF

Dependency Head Annotation for Myanmar Dependency Treebank

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 788–800, 2020; DOI: 10.25046/aj050694
Abstract:

Complete manual annotation of dependency treebank needs resources like annotators and annotation tools and takes long time and has high possibility of inconsistent annotations for free word order languages such as Myanmar. This paper describes a dependency head annotation scheme with Universal part-of-speech and Universal Dependencies for Myanmar dependency treebank. Currently 22,810 sentences and 680,218…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 673 KB Download PDF

Vietnamese Text Classification with TextRank and Jaccard Similarity Coefficient

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 363–369, 2020; DOI: 10.25046/aj050644
Abstract:

Text classification is considered one of the most fundamental and essential problems that deal with automatically classifying textual resources into pre-defined categories. Numerous algorithms, datasets, and evaluation measurements have been proposed to address the task. Within the era of information redundancy, it is challenging and time-consuming to engineering a sizable amount of data in multi-languages…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
13 Pages, 4,219 KB Download PDF

Four-Dimensional Sparse Data Structures for Representing Text Data

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 154–166, 2020; DOI: 10.25046/aj050521
Abstract:

This paper focuses on a string encoding algorithm, which produces sparse distributed representations of text data. A characteristic feature of the algorithm described here, is that it works without tokenizing the text and can avoid other data preparation steps, such as stemming and lemmatization. The text can be of arbitrary size, whether it is a…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 264 KB Download PDF

Using Privacy Enhancing and Fine-Grained Access Controlled eKYC to implement Privacy Aware eSign

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 347–358, 2019; DOI: 10.25046/aj040443
Abstract:

eSign is an online electronic signature service which is recently gaining more prominence in India. eSign is based on two online services from UIDAI, viz. a viz., Aadhaar based authentication and retrieval of resident’s eKYC information after taking his/her consent. With increased adoption of Aadhaar based services, privacy of user data has become more and…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 1,057 KB Download PDF

Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 30–35, 2017; DOI: 10.25046/aj020305
Abstract:

Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers.  Traditional data center security best practices involving network segmentation are not well suited to these new environments.  We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026